# STDOUT: ---v---v---v---v---v--- ansible-playbook [core 2.13.6] config file = /etc/ansible/ansible.cfg configured module search path = ['/home/jenkins/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /opt/ansible-2.13/lib/python3.8/site-packages/ansible ansible collection location = /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection executable location = /opt/ansible-2.13/bin/ansible-playbook python version = 3.8.13 (default, Jun 24 2022, 15:27:57) [GCC 8.5.0 20210514 (Red Hat 8.5.0-13)] jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'debug', as we already have a stdout callback. Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_mesh_cert.yml ************************************************** 1 plays in /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml PLAY [all] ********************************************************************* TASK [Gathering Facts] ********************************************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:3 Monday 21 November 2022 20:20:43 +0000 (0:00:00.016) 0:00:00.016 ******* ok: [sut] META: ran handlers TASK [Set up test environment] ************************************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:19 Monday 21 November 2022 20:20:44 +0000 (0:00:00.986) 0:00:01.003 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml for sut TASK [Set platform/version specific variables] ********************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:2 Monday 21 November 2022 20:20:44 +0000 (0:00:00.036) 0:00:01.040 ******* TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Monday 21 November 2022 20:20:44 +0000 (0:00:00.042) 0:00:01.082 ******* ok: [sut] TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:7 Monday 21 November 2022 20:20:45 +0000 (0:00:00.459) 0:00:01.542 ******* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=Fedora.yml) => { "ansible_facts": {}, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/Fedora.yml" ], "ansible_loop_var": "item", "changed": false, "item": "Fedora.yml" } skipping: [sut] => (item=Fedora_35.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_35.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora_35.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_35.yml", "skip_reason": "Conditional result was False" } META: role_complete for sut TASK [Change inventory_hostname] *********************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:10 Monday 21 November 2022 20:20:45 +0000 (0:00:00.068) 0:00:01.611 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [add dummy main host] ***************************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:16 Monday 21 November 2022 20:20:45 +0000 (0:00:00.045) 0:00:01.656 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Create nss directory for testing] **************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:22 Monday 21 November 2022 20:20:45 +0000 (0:00:00.043) 0:00:01.699 ******* changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/var/lib/ipsec/nss", "secontext": "unconfined_u:object_r:var_lib_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Create /etc/ipsec.d directory for testing] ******************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:28 Monday 21 November 2022 20:20:45 +0000 (0:00:00.414) 0:00:02.114 ******* changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Dynamically add more hosts] ********************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:34 Monday 21 November 2022 20:20:46 +0000 (0:00:00.252) 0:00:02.367 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/add_hosts.yml for sut TASK [dynamically add multiple hosts for testing] ****************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/add_hosts.yml:2 Monday 21 November 2022 20:20:46 +0000 (0:00:00.030) 0:00:02.397 ******* creating host via 'add_host': hostname=host01.local creating host via 'add_host': hostname=host02.local changed: [sut] => (item=1) => { "add_host": { "groups": [ "testing" ], "host_name": "host01.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 1 } changed: [sut] => (item=2) => { "add_host": { "groups": [ "testing" ], "host_name": "host02.local", "host_vars": { "cert_name": "dyn_cert", "current_ip": "169.254.1.1", "current_subnet": "169.254.0.0/16" } }, "ansible_loop_var": "item", "changed": true, "item": 2 } TASK [create mock vpn_connections] ********************************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/add_hosts.yml:11 Monday 21 November 2022 20:20:46 +0000 (0:00:00.061) 0:00:02.459 ******* ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "hosts": { "host01.local": "", "host02.local": "", "sut": "" } } ] }, "changed": false } TASK [Create dummy policies directory for testing] ***************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:39 Monday 21 November 2022 20:20:46 +0000 (0:00:00.033) 0:00:02.492 ******* changed: [sut] => { "changed": true, "gid": 0, "group": "root", "mode": "0600", "owner": "root", "path": "/etc/ipsec.d/policies", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 4096, "state": "directory", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:45 Monday 21 November 2022 20:20:46 +0000 (0:00:00.272) 0:00:02.764 ******* changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/private", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:51 Monday 21 November 2022 20:20:46 +0000 (0:00:00.274) 0:00:03.038 ******* changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/private-or-clear", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Create dummy policy files for testing] *********************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:57 Monday 21 November 2022 20:20:47 +0000 (0:00:00.274) 0:00:03.313 ******* changed: [sut] => { "changed": true, "dest": "/etc/ipsec.d/policies/clear", "gid": 0, "group": "root", "mode": "0600", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 0, "state": "file", "uid": 0 } TASK [Add extra options to check] ********************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:27 Monday 21 November 2022 20:20:47 +0000 (0:00:00.273) 0:00:03.587 ******* ok: [sut] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "hosts": { "host01.local": "", "host02.local": "", "sut": "" }, "opportunistic": true, "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] } ] }, "changed": false } TASK [add cert_name fact to controller] **************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:42 Monday 21 November 2022 20:20:47 +0000 (0:00:00.031) 0:00:03.618 ******* ok: [sut] => { "ansible_facts": { "cert_name": "main_cert" }, "changed": false } TASK [Use vpn role] ************************************************************ task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:46 Monday 21 November 2022 20:20:47 +0000 (0:00:00.026) 0:00:03.645 ******* TASK [fedora.linux_system_roles.vpn : set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:3 Monday 21 November 2022 20:20:47 +0000 (0:00:00.065) 0:00:03.710 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml for sut TASK [fedora.linux_system_roles.vpn : Ensure ansible_facts used by role] ******* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 Monday 21 November 2022 20:20:47 +0000 (0:00:00.031) 0:00:03.741 ******* ok: [sut] TASK [fedora.linux_system_roles.vpn : Set platform/version specific variables] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:7 Monday 21 November 2022 20:20:48 +0000 (0:00:00.458) 0:00:04.200 ******* skipping: [sut] => (item=RedHat.yml) => { "ansible_loop_var": "item", "changed": false, "item": "RedHat.yml", "skip_reason": "Conditional result was False" } ok: [sut] => (item=Fedora.yml) => { "ansible_facts": {}, "ansible_included_var_files": [ "/WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/vars/Fedora.yml" ], "ansible_loop_var": "item", "changed": false, "item": "Fedora.yml" } skipping: [sut] => (item=Fedora_35.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_35.yml", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=Fedora_35.yml) => { "ansible_loop_var": "item", "changed": false, "item": "Fedora_35.yml", "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Ensure required packages are installed] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 Monday 21 November 2022 20:20:48 +0000 (0:00:00.061) 0:00:04.261 ******* changed: [sut] => { "changed": true, "rc": 0, "results": [ "Installed: logrotate-3.18.1-4.fc35.x86_64", "Installed: nss-tools-3.83.0-1.fc35.x86_64", "Installed: libreswan-4.9-1.fc35.x86_64", "Installed: ldns-1.8.1-3.fc35.x86_64" ] } TASK [fedora.linux_system_roles.vpn : Configure firewall] ********************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:12 Monday 21 November 2022 20:20:53 +0000 (0:00:05.125) 0:00:09.387 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml for sut TASK [Ensure the vpn ports status with the firewall role] ********************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/firewall.yml:3 Monday 21 November 2022 20:20:53 +0000 (0:00:00.030) 0:00:09.418 ******* TASK [fedora.linux_system_roles.firewall : include_tasks] ********************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:1 Monday 21 November 2022 20:20:53 +0000 (0:00:00.079) 0:00:09.497 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml for sut TASK [fedora.linux_system_roles.firewall : Ensure ansible_facts used by role] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Monday 21 November 2022 20:20:53 +0000 (0:00:00.036) 0:00:09.534 ******* ok: [sut] TASK [fedora.linux_system_roles.firewall : Install firewalld] ****************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:7 Monday 21 November 2022 20:20:53 +0000 (0:00:00.439) 0:00:09.974 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [fedora.linux_system_roles.firewall : Install python-firewall] ************ task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:12 Monday 21 November 2022 20:20:56 +0000 (0:00:02.678) 0:00:12.652 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Install python3-firewall] *********** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:18 Monday 21 November 2022 20:20:56 +0000 (0:00:00.032) 0:00:12.685 ******* ok: [sut] => { "changed": false, "rc": 0, "results": [] } MSG: Nothing to do TASK [fedora.linux_system_roles.firewall : Enable and start firewalld service] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:3 Monday 21 November 2022 20:20:59 +0000 (0:00:02.738) 0:00:15.423 ******* changed: [sut] => { "changed": true, "enabled": true, "name": "firewalld", "state": "started", "status": { "ActiveEnterTimestamp": "n/a", "ActiveEnterTimestampMonotonic": "0", "ActiveExitTimestamp": "n/a", "ActiveExitTimestampMonotonic": "0", "ActiveState": "inactive", "After": "system.slice dbus-broker.service dbus.socket polkit.service sysinit.target basic.target", "AllowIsolate": "no", "AssertResult": "no", "AssertTimestamp": "n/a", "AssertTimestampMonotonic": "0", "Before": "shutdown.target network-pre.target", "BlockIOAccounting": "no", "BlockIOWeight": "[not set]", "BusName": "org.fedoraproject.FirewallD1", "CPUAccounting": "yes", "CPUAffinityFromNUMA": "no", "CPUQuotaPerSecUSec": "infinity", "CPUQuotaPeriodUSec": "infinity", "CPUSchedulingPolicy": "0", "CPUSchedulingPriority": "0", "CPUSchedulingResetOnFork": "no", "CPUShares": "[not set]", "CPUUsageNSec": "[not set]", "CPUWeight": "[not set]", "CacheDirectoryMode": "0755", "CanFreeze": "yes", "CanIsolate": "no", "CanReload": "yes", "CanStart": "yes", "CanStop": "yes", "CapabilityBoundingSet": "cap_chown cap_dac_override cap_dac_read_search cap_fowner cap_fsetid cap_kill cap_setgid cap_setuid cap_setpcap cap_linux_immutable cap_net_bind_service cap_net_broadcast cap_net_admin cap_net_raw cap_ipc_lock cap_ipc_owner cap_sys_module cap_sys_rawio cap_sys_chroot cap_sys_ptrace cap_sys_pacct cap_sys_admin cap_sys_boot cap_sys_nice cap_sys_resource cap_sys_time cap_sys_tty_config cap_mknod cap_lease cap_audit_write cap_audit_control cap_setfcap cap_mac_override cap_mac_admin cap_syslog cap_wake_alarm cap_block_suspend cap_audit_read cap_perfmon cap_bpf cap_checkpoint_restore", "CleanResult": "success", "CollectMode": "inactive", "ConditionResult": "no", "ConditionTimestamp": "n/a", "ConditionTimestampMonotonic": "0", "ConfigurationDirectoryMode": "0755", "Conflicts": "ip6tables.service shutdown.target ebtables.service iptables.service ipset.service nftables.service", "ControlPID": "0", "CoredumpFilter": "0x33", "DefaultDependencies": "yes", "DefaultMemoryLow": "0", "DefaultMemoryMin": "0", "Delegate": "no", "Description": "firewalld - dynamic firewall daemon", "DevicePolicy": "auto", "Documentation": "\"man:firewalld(1)\"", "DynamicUser": "no", "EnvironmentFiles": "/etc/sysconfig/firewalld (ignore_errors=yes)", "ExecMainCode": "0", "ExecMainExitTimestamp": "n/a", "ExecMainExitTimestampMonotonic": "0", "ExecMainPID": "0", "ExecMainStartTimestamp": "n/a", "ExecMainStartTimestampMonotonic": "0", "ExecMainStatus": "0", "ExecReload": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecReloadEx": "{ path=/bin/kill ; argv[]=/bin/kill -HUP $MAINPID ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStart": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; ignore_errors=no ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "ExecStartEx": "{ path=/usr/sbin/firewalld ; argv[]=/usr/sbin/firewalld --nofork --nopid $FIREWALLD_ARGS ; flags= ; start_time=[n/a] ; stop_time=[n/a] ; pid=0 ; code=(null) ; status=0/0 }", "FailureAction": "none", "FileDescriptorStoreMax": "0", "FinalKillSignal": "9", "FragmentPath": "/usr/lib/systemd/system/firewalld.service", "FreezerState": "running", "GID": "[not set]", "GuessMainPID": "yes", "IOAccounting": "no", "IOReadBytes": "18446744073709551615", "IOReadOperations": "18446744073709551615", "IOSchedulingClass": "0", "IOSchedulingPriority": "0", "IOWeight": "[not set]", "IOWriteBytes": "18446744073709551615", "IOWriteOperations": "18446744073709551615", "IPAccounting": "no", "IPEgressBytes": "[no data]", "IPEgressPackets": "[no data]", "IPIngressBytes": "[no data]", "IPIngressPackets": "[no data]", "Id": "firewalld.service", "IgnoreOnIsolate": "no", "IgnoreSIGPIPE": "yes", "InactiveEnterTimestamp": "n/a", "InactiveEnterTimestampMonotonic": "0", "InactiveExitTimestamp": "n/a", "InactiveExitTimestampMonotonic": "0", "JobRunningTimeoutUSec": "infinity", "JobTimeoutAction": "none", "JobTimeoutUSec": "infinity", "KeyringMode": "private", "KillMode": "mixed", "KillSignal": "15", "LimitAS": "infinity", "LimitASSoft": "infinity", "LimitCORE": "infinity", "LimitCORESoft": "infinity", "LimitCPU": "infinity", "LimitCPUSoft": "infinity", "LimitDATA": "infinity", "LimitDATASoft": "infinity", "LimitFSIZE": "infinity", "LimitFSIZESoft": "infinity", "LimitLOCKS": "infinity", "LimitLOCKSSoft": "infinity", "LimitMEMLOCK": "8388608", "LimitMEMLOCKSoft": "8388608", "LimitMSGQUEUE": "819200", "LimitMSGQUEUESoft": "819200", "LimitNICE": "0", "LimitNICESoft": "0", "LimitNOFILE": "524288", "LimitNOFILESoft": "1024", "LimitNPROC": "14797", "LimitNPROCSoft": "14797", "LimitRSS": "infinity", "LimitRSSSoft": "infinity", "LimitRTPRIO": "0", "LimitRTPRIOSoft": "0", "LimitRTTIME": "infinity", "LimitRTTIMESoft": "infinity", "LimitSIGPENDING": "14797", "LimitSIGPENDINGSoft": "14797", "LimitSTACK": "infinity", "LimitSTACKSoft": "8388608", "LoadState": "loaded", "LockPersonality": "no", "LogLevelMax": "-1", "LogRateLimitBurst": "0", "LogRateLimitIntervalUSec": "0", "LogsDirectoryMode": "0755", "MainPID": "0", "ManagedOOMMemoryPressure": "auto", "ManagedOOMMemoryPressureLimit": "0", "ManagedOOMPreference": "none", "ManagedOOMSwap": "auto", "MemoryAccounting": "yes", "MemoryAvailable": "infinity", "MemoryCurrent": "[not set]", "MemoryDenyWriteExecute": "no", "MemoryHigh": "infinity", "MemoryLimit": "infinity", "MemoryLow": "0", "MemoryMax": "infinity", "MemoryMin": "0", "MemorySwapMax": "infinity", "MountAPIVFS": "no", "NFileDescriptorStore": "0", "NRestarts": "0", "NUMAPolicy": "n/a", "Names": "firewalld.service", "NeedDaemonReload": "no", "Nice": "0", "NoNewPrivileges": "no", "NonBlocking": "no", "NotifyAccess": "none", "OOMPolicy": "stop", "OOMScoreAdjust": "0", "OnFailureJobMode": "replace", "OnSuccessJobMode": "fail", "Perpetual": "no", "PrivateDevices": "no", "PrivateIPC": "no", "PrivateMounts": "no", "PrivateNetwork": "no", "PrivateTmp": "no", "PrivateUsers": "no", "ProcSubset": "all", "ProtectClock": "no", "ProtectControlGroups": "no", "ProtectHome": "no", "ProtectHostname": "no", "ProtectKernelLogs": "no", "ProtectKernelModules": "no", "ProtectKernelTunables": "no", "ProtectProc": "default", "ProtectSystem": "no", "RefuseManualStart": "no", "RefuseManualStop": "no", "ReloadResult": "success", "RemainAfterExit": "no", "RemoveIPC": "no", "Requires": "dbus.socket system.slice sysinit.target", "Restart": "no", "RestartKillSignal": "15", "RestartUSec": "100ms", "RestrictNamespaces": "no", "RestrictRealtime": "no", "RestrictSUIDSGID": "no", "Result": "success", "RootDirectoryStartOnly": "no", "RuntimeDirectoryMode": "0755", "RuntimeDirectoryPreserve": "no", "RuntimeMaxUSec": "infinity", "SameProcessGroup": "no", "SecureBits": "0", "SendSIGHUP": "no", "SendSIGKILL": "yes", "Slice": "system.slice", "StandardError": "null", "StandardInput": "null", "StandardOutput": "null", "StartLimitAction": "none", "StartLimitBurst": "5", "StartLimitIntervalUSec": "10s", "StartupBlockIOWeight": "[not set]", "StartupCPUShares": "[not set]", "StartupCPUWeight": "[not set]", "StartupIOWeight": "[not set]", "StateChangeTimestamp": "n/a", "StateChangeTimestampMonotonic": "0", "StateDirectoryMode": "0755", "StatusErrno": "0", "StopWhenUnneeded": "no", "SubState": "dead", "SuccessAction": "none", "SyslogFacility": "3", "SyslogLevel": "6", "SyslogLevelPrefix": "yes", "SyslogPriority": "30", "SystemCallErrorNumber": "2147483646", "TTYReset": "no", "TTYVHangup": "no", "TTYVTDisallocate": "no", "TasksAccounting": "yes", "TasksCurrent": "[not set]", "TasksMax": "4439", "TimeoutAbortUSec": "1min 30s", "TimeoutCleanUSec": "infinity", "TimeoutStartFailureMode": "terminate", "TimeoutStartUSec": "1min 30s", "TimeoutStopFailureMode": "terminate", "TimeoutStopUSec": "1min 30s", "TimerSlackNSec": "50000", "Transient": "no", "Type": "dbus", "UID": "[not set]", "UMask": "0022", "UnitFilePreset": "enabled", "UnitFileState": "disabled", "UtmpMode": "init", "Wants": "network-pre.target", "WatchdogSignal": "6", "WatchdogTimestamp": "n/a", "WatchdogTimestampMonotonic": "0", "WatchdogUSec": "infinity" } } TASK [fedora.linux_system_roles.firewall : Check if previous replaced is defined] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:9 Monday 21 November 2022 20:21:00 +0000 (0:00:01.577) 0:00:17.001 ******* ok: [sut] => { "ansible_facts": { "__firewall_previous_replaced": false, "__firewall_python_cmd": "/usr/bin/python3" }, "changed": false } TASK [fedora.linux_system_roles.firewall : Get config files, checksums before and remove] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:14 Monday 21 November 2022 20:21:00 +0000 (0:00:00.055) 0:00:17.057 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Configure firewall] ***************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:36 Monday 21 November 2022 20:21:00 +0000 (0:00:00.043) 0:00:17.100 ******* changed: [sut] => (item={'service': 'ipsec', 'state': 'enabled'}) => { "__firewall_changed": true, "ansible_loop_var": "item", "changed": true, "item": { "service": "ipsec", "state": "enabled" } } TASK [fedora.linux_system_roles.firewall : gather firewall config information] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:77 Monday 21 November 2022 20:21:03 +0000 (0:00:02.362) 0:00:19.462 ******* skipping: [sut] => (item={'service': 'ipsec', 'state': 'enabled'}) => { "ansible_loop_var": "item", "changed": false, "item": { "service": "ipsec", "state": "enabled" }, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : update firewalld_config fact] ******* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:87 Monday 21 November 2022 20:21:03 +0000 (0:00:00.062) 0:00:19.524 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : gather firewall config if no arguments] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:99 Monday 21 November 2022 20:21:03 +0000 (0:00:00.055) 0:00:19.579 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : update firewalld_config fact] ******* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:104 Monday 21 November 2022 20:21:03 +0000 (0:00:00.044) 0:00:19.624 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Get config files, checksums after] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:114 Monday 21 November 2022 20:21:03 +0000 (0:00:00.044) 0:00:19.669 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Calculate what has changed] ********* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:122 Monday 21 November 2022 20:21:03 +0000 (0:00:00.044) 0:00:19.713 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.firewall : Show diffs] ************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:128 Monday 21 November 2022 20:21:03 +0000 (0:00:00.045) 0:00:19.759 ******* skipping: [sut] => {} META: role_complete for sut TASK [fedora.linux_system_roles.vpn : Configure selinux] *********************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:15 Monday 21 November 2022 20:21:03 +0000 (0:00:00.053) 0:00:19.812 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml for sut TASK [fedora.linux_system_roles.vpn : Populate service facts] ****************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 Monday 21 November 2022 20:21:03 +0000 (0:00:00.037) 0:00:19.850 ******* ok: [sut] => { "ansible_facts": { "services": { "NetworkManager-dispatcher.service": { "name": "NetworkManager-dispatcher.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "NetworkManager-wait-online.service": { "name": "NetworkManager-wait-online.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "NetworkManager.service": { "name": "NetworkManager.service", "source": "systemd", "state": "running", "status": "enabled" }, "arp-ethers.service": { "name": "arp-ethers.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "auditd.service": { "name": "auditd.service", "source": "systemd", "state": "running", "status": "enabled" }, "auth-rpcgss-module.service": { "name": "auth-rpcgss-module.service", "source": "systemd", "state": "stopped", "status": "static" }, "autovt@.service": { "name": "autovt@.service", "source": "systemd", "state": "unknown", "status": "alias" }, "bluetooth.service": { "name": "bluetooth.service", "source": "systemd", "state": "inactive", "status": "enabled" }, "chrony-wait.service": { "name": "chrony-wait.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "chronyd.service": { "name": "chronyd.service", "source": "systemd", "state": "running", "status": "enabled" }, "cloud-config.service": { "name": "cloud-config.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "cloud-final.service": { "name": "cloud-final.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "cloud-init-local.service": { "name": "cloud-init-local.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "cloud-init.service": { "name": "cloud-init.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "console-getty.service": { "name": "console-getty.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "container-getty@.service": { "name": "container-getty@.service", "source": "systemd", "state": "unknown", "status": "static" }, "dbus-broker.service": { "name": "dbus-broker.service", "source": "systemd", "state": "running", "status": "enabled" }, "dbus-org.bluez.service": { "name": "dbus-org.bluez.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus-org.fedoraproject.FirewallD1.service": { "name": "dbus-org.fedoraproject.FirewallD1.service", "source": "systemd", "state": "active", "status": "alias" }, "dbus-org.freedesktop.hostname1.service": { "name": "dbus-org.freedesktop.hostname1.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus-org.freedesktop.locale1.service": { "name": "dbus-org.freedesktop.locale1.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus-org.freedesktop.login1.service": { "name": "dbus-org.freedesktop.login1.service", "source": "systemd", "state": "active", "status": "alias" }, "dbus-org.freedesktop.nm-dispatcher.service": { "name": "dbus-org.freedesktop.nm-dispatcher.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus-org.freedesktop.oom1.service": { "name": "dbus-org.freedesktop.oom1.service", "source": "systemd", "state": "active", "status": "alias" }, "dbus-org.freedesktop.portable1.service": { "name": "dbus-org.freedesktop.portable1.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus-org.freedesktop.resolve1.service": { "name": "dbus-org.freedesktop.resolve1.service", "source": "systemd", "state": "active", "status": "alias" }, "dbus-org.freedesktop.timedate1.service": { "name": "dbus-org.freedesktop.timedate1.service", "source": "systemd", "state": "inactive", "status": "alias" }, "dbus.service": { "name": "dbus.service", "source": "systemd", "state": "active", "status": "alias" }, "debug-shell.service": { "name": "debug-shell.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "display-manager.service": { "name": "display-manager.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "dnf-makecache.service": { "name": "dnf-makecache.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-cmdline.service": { "name": "dracut-cmdline.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-initqueue.service": { "name": "dracut-initqueue.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-mount.service": { "name": "dracut-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-mount.service": { "name": "dracut-pre-mount.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-pivot.service": { "name": "dracut-pre-pivot.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-trigger.service": { "name": "dracut-pre-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-pre-udev.service": { "name": "dracut-pre-udev.service", "source": "systemd", "state": "stopped", "status": "static" }, "dracut-shutdown.service": { "name": "dracut-shutdown.service", "source": "systemd", "state": "stopped", "status": "static" }, "ebtables.service": { "name": "ebtables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "emergency.service": { "name": "emergency.service", "source": "systemd", "state": "stopped", "status": "static" }, "firewalld.service": { "name": "firewalld.service", "source": "systemd", "state": "running", "status": "enabled" }, "fstrim.service": { "name": "fstrim.service", "source": "systemd", "state": "stopped", "status": "static" }, "fwupd-offline-update.service": { "name": "fwupd-offline-update.service", "source": "systemd", "state": "inactive", "status": "static" }, "fwupd-refresh.service": { "name": "fwupd-refresh.service", "source": "systemd", "state": "inactive", "status": "static" }, "fwupd.service": { "name": "fwupd.service", "source": "systemd", "state": "inactive", "status": "static" }, "getty@.service": { "name": "getty@.service", "source": "systemd", "state": "unknown", "status": "enabled" }, "getty@tty1.service": { "name": "getty@tty1.service", "source": "systemd", "state": "running", "status": "active" }, "grub-boot-indeterminate.service": { "name": "grub-boot-indeterminate.service", "source": "systemd", "state": "inactive", "status": "static" }, "grub2-systemd-integration.service": { "name": "grub2-systemd-integration.service", "source": "systemd", "state": "inactive", "status": "static" }, "gssproxy.service": { "name": "gssproxy.service", "source": "systemd", "state": "running", "status": "disabled" }, "hv_kvp_daemon.service": { "name": "hv_kvp_daemon.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "import-state.service": { "name": "import-state.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "initrd-cleanup.service": { "name": "initrd-cleanup.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-parse-etc.service": { "name": "initrd-parse-etc.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-switch-root.service": { "name": "initrd-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "initrd-udevadm-cleanup-db.service": { "name": "initrd-udevadm-cleanup-db.service", "source": "systemd", "state": "stopped", "status": "static" }, "ip6tables.service": { "name": "ip6tables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ipsec.service": { "name": "ipsec.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ipset.service": { "name": "ipset.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "iptables.service": { "name": "iptables.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "kmod-static-nodes.service": { "name": "kmod-static-nodes.service", "source": "systemd", "state": "stopped", "status": "static" }, "ldconfig.service": { "name": "ldconfig.service", "source": "systemd", "state": "stopped", "status": "static" }, "loadmodules.service": { "name": "loadmodules.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "logrotate.service": { "name": "logrotate.service", "source": "systemd", "state": "stopped", "status": "static" }, "man-db-cache-update.service": { "name": "man-db-cache-update.service", "source": "systemd", "state": "inactive", "status": "static" }, "man-db-restart-cache-update.service": { "name": "man-db-restart-cache-update.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "mdadm-grow-continue@.service": { "name": "mdadm-grow-continue@.service", "source": "systemd", "state": "unknown", "status": "static" }, "mdadm-last-resort@.service": { "name": "mdadm-last-resort@.service", "source": "systemd", "state": "unknown", "status": "static" }, "mdcheck_continue.service": { "name": "mdcheck_continue.service", "source": "systemd", "state": "inactive", "status": "static" }, "mdcheck_start.service": { "name": "mdcheck_start.service", "source": "systemd", "state": "inactive", "status": "static" }, "mdmon@.service": { "name": "mdmon@.service", "source": "systemd", "state": "unknown", "status": "static" }, "mdmonitor-oneshot.service": { "name": "mdmonitor-oneshot.service", "source": "systemd", "state": "inactive", "status": "static" }, "mdmonitor.service": { "name": "mdmonitor.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "modprobe@.service": { "name": "modprobe@.service", "source": "systemd", "state": "unknown", "status": "static" }, "modprobe@configfs.service": { "name": "modprobe@configfs.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "modprobe@drm.service": { "name": "modprobe@drm.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "modprobe@fuse.service": { "name": "modprobe@fuse.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "network.service": { "name": "network.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "nfs-blkmap.service": { "name": "nfs-blkmap.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-convert.service": { "name": "nfs-convert.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "nfs-idmapd.service": { "name": "nfs-idmapd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-mountd.service": { "name": "nfs-mountd.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfs-server.service": { "name": "nfs-server.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nfs-utils.service": { "name": "nfs-utils.service", "source": "systemd", "state": "stopped", "status": "static" }, "nfsdcld.service": { "name": "nfsdcld.service", "source": "systemd", "state": "stopped", "status": "static" }, "nftables.service": { "name": "nftables.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "nis-domainname.service": { "name": "nis-domainname.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "ntpd.service": { "name": "ntpd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "ntpdate.service": { "name": "ntpdate.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "pam_namespace.service": { "name": "pam_namespace.service", "source": "systemd", "state": "inactive", "status": "static" }, "pcscd.service": { "name": "pcscd.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "plymouth-halt.service": { "name": "plymouth-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-kexec.service": { "name": "plymouth-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-poweroff.service": { "name": "plymouth-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-quit-wait.service": { "name": "plymouth-quit-wait.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-quit.service": { "name": "plymouth-quit.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-read-write.service": { "name": "plymouth-read-write.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-reboot.service": { "name": "plymouth-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-start.service": { "name": "plymouth-start.service", "source": "systemd", "state": "stopped", "status": "static" }, "plymouth-switch-root-initramfs.service": { "name": "plymouth-switch-root-initramfs.service", "source": "systemd", "state": "inactive", "status": "static" }, "plymouth-switch-root.service": { "name": "plymouth-switch-root.service", "source": "systemd", "state": "stopped", "status": "static" }, "polkit.service": { "name": "polkit.service", "source": "systemd", "state": "running", "status": "static" }, "quotaon.service": { "name": "quotaon.service", "source": "systemd", "state": "inactive", "status": "static" }, "raid-check.service": { "name": "raid-check.service", "source": "systemd", "state": "stopped", "status": "static" }, "rc-local.service": { "name": "rc-local.service", "source": "systemd", "state": "stopped", "status": "static" }, "rdisc.service": { "name": "rdisc.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "rescue.service": { "name": "rescue.service", "source": "systemd", "state": "stopped", "status": "static" }, "restraintd.service": { "name": "restraintd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rngd.service": { "name": "rngd.service", "source": "systemd", "state": "running", "status": "enabled" }, "rpc-gssd.service": { "name": "rpc-gssd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd-notify.service": { "name": "rpc-statd-notify.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-statd.service": { "name": "rpc-statd.service", "source": "systemd", "state": "stopped", "status": "static" }, "rpc-svcgssd.service": { "name": "rpc-svcgssd.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "rpcbind.service": { "name": "rpcbind.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "rpmdb-rebuild.service": { "name": "rpmdb-rebuild.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "selinux-autorelabel-mark.service": { "name": "selinux-autorelabel-mark.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "selinux-autorelabel.service": { "name": "selinux-autorelabel.service", "source": "systemd", "state": "inactive", "status": "static" }, "selinux-check-proper-disable.service": { "name": "selinux-check-proper-disable.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "serial-getty@.service": { "name": "serial-getty@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sntp.service": { "name": "sntp.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen.service": { "name": "sshd-keygen.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "sshd-keygen@.service": { "name": "sshd-keygen@.service", "source": "systemd", "state": "unknown", "status": "disabled" }, "sshd-keygen@ecdsa.service": { "name": "sshd-keygen@ecdsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@ed25519.service": { "name": "sshd-keygen@ed25519.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd-keygen@rsa.service": { "name": "sshd-keygen@rsa.service", "source": "systemd", "state": "stopped", "status": "inactive" }, "sshd.service": { "name": "sshd.service", "source": "systemd", "state": "running", "status": "enabled" }, "sshd@.service": { "name": "sshd@.service", "source": "systemd", "state": "unknown", "status": "static" }, "sssd-autofs.service": { "name": "sssd-autofs.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-kcm.service": { "name": "sssd-kcm.service", "source": "systemd", "state": "stopped", "status": "indirect" }, "sssd-nss.service": { "name": "sssd-nss.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pac.service": { "name": "sssd-pac.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-pam.service": { "name": "sssd-pam.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-ssh.service": { "name": "sssd-ssh.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd-sudo.service": { "name": "sssd-sudo.service", "source": "systemd", "state": "inactive", "status": "indirect" }, "sssd.service": { "name": "sssd.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "syslog.service": { "name": "syslog.service", "source": "systemd", "state": "stopped", "status": "not-found" }, "system-update-cleanup.service": { "name": "system-update-cleanup.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-ask-password-console.service": { "name": "systemd-ask-password-console.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-plymouth.service": { "name": "systemd-ask-password-plymouth.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-ask-password-wall.service": { "name": "systemd-ask-password-wall.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-backlight@.service": { "name": "systemd-backlight@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-binfmt.service": { "name": "systemd-binfmt.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-bless-boot.service": { "name": "systemd-bless-boot.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-boot-check-no-failures.service": { "name": "systemd-boot-check-no-failures.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-boot-system-token.service": { "name": "systemd-boot-system-token.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-coredump@.service": { "name": "systemd-coredump@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-exit.service": { "name": "systemd-exit.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-firstboot.service": { "name": "systemd-firstboot.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-fsck-root.service": { "name": "systemd-fsck-root.service", "source": "systemd", "state": "stopped", "status": "enabled-runtime" }, "systemd-fsck@.service": { "name": "systemd-fsck@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-halt.service": { "name": "systemd-halt.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hibernate-resume@.service": { "name": "systemd-hibernate-resume@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-hibernate.service": { "name": "systemd-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-homed-activate.service": { "name": "systemd-homed-activate.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-homed.service": { "name": "systemd-homed.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-hostnamed.service": { "name": "systemd-hostnamed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-hwdb-update.service": { "name": "systemd-hwdb-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-hybrid-sleep.service": { "name": "systemd-hybrid-sleep.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-initctl.service": { "name": "systemd-initctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-catalog-update.service": { "name": "systemd-journal-catalog-update.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journal-flush.service": { "name": "systemd-journal-flush.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-journald.service": { "name": "systemd-journald.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-journald@.service": { "name": "systemd-journald@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-kexec.service": { "name": "systemd-kexec.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-localed.service": { "name": "systemd-localed.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-logind.service": { "name": "systemd-logind.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-machine-id-commit.service": { "name": "systemd-machine-id-commit.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-modules-load.service": { "name": "systemd-modules-load.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-network-generator.service": { "name": "systemd-network-generator.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "systemd-networkd-wait-online.service": { "name": "systemd-networkd-wait-online.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "systemd-networkd.service": { "name": "systemd-networkd.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "systemd-oomd.service": { "name": "systemd-oomd.service", "source": "systemd", "state": "running", "status": "enabled" }, "systemd-portabled.service": { "name": "systemd-portabled.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-poweroff.service": { "name": "systemd-poweroff.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-pstore.service": { "name": "systemd-pstore.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-quotacheck.service": { "name": "systemd-quotacheck.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-random-seed.service": { "name": "systemd-random-seed.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-reboot.service": { "name": "systemd-reboot.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-remount-fs.service": { "name": "systemd-remount-fs.service", "source": "systemd", "state": "stopped", "status": "enabled-runtime" }, "systemd-repart.service": { "name": "systemd-repart.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-resolved.service": { "name": "systemd-resolved.service", "source": "systemd", "state": "running", "status": "enabled" }, "systemd-rfkill.service": { "name": "systemd-rfkill.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-suspend-then-hibernate.service": { "name": "systemd-suspend-then-hibernate.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-suspend.service": { "name": "systemd-suspend.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-sysctl.service": { "name": "systemd-sysctl.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-sysext.service": { "name": "systemd-sysext.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-sysusers.service": { "name": "systemd-sysusers.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-time-wait-sync.service": { "name": "systemd-time-wait-sync.service", "source": "systemd", "state": "inactive", "status": "disabled" }, "systemd-timedated.service": { "name": "systemd-timedated.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-timesyncd.service": { "name": "systemd-timesyncd.service", "source": "systemd", "state": "stopped", "status": "disabled" }, "systemd-tmpfiles-clean.service": { "name": "systemd-tmpfiles-clean.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup-dev.service": { "name": "systemd-tmpfiles-setup-dev.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-tmpfiles-setup.service": { "name": "systemd-tmpfiles-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-settle.service": { "name": "systemd-udev-settle.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udev-trigger.service": { "name": "systemd-udev-trigger.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-udevd.service": { "name": "systemd-udevd.service", "source": "systemd", "state": "running", "status": "static" }, "systemd-update-done.service": { "name": "systemd-update-done.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp-runlevel.service": { "name": "systemd-update-utmp-runlevel.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-update-utmp.service": { "name": "systemd-update-utmp.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-user-sessions.service": { "name": "systemd-user-sessions.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-userdbd.service": { "name": "systemd-userdbd.service", "source": "systemd", "state": "running", "status": "indirect" }, "systemd-vconsole-setup.service": { "name": "systemd-vconsole-setup.service", "source": "systemd", "state": "stopped", "status": "static" }, "systemd-volatile-root.service": { "name": "systemd-volatile-root.service", "source": "systemd", "state": "inactive", "status": "static" }, "systemd-zram-setup@.service": { "name": "systemd-zram-setup@.service", "source": "systemd", "state": "unknown", "status": "static" }, "systemd-zram-setup@zram0.service": { "name": "systemd-zram-setup@zram0.service", "source": "systemd", "state": "stopped", "status": "active" }, "udisks2.service": { "name": "udisks2.service", "source": "systemd", "state": "stopped", "status": "enabled" }, "unbound-anchor.service": { "name": "unbound-anchor.service", "source": "systemd", "state": "stopped", "status": "static" }, "user-runtime-dir@.service": { "name": "user-runtime-dir@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user-runtime-dir@0.service": { "name": "user-runtime-dir@0.service", "source": "systemd", "state": "stopped", "status": "active" }, "user@.service": { "name": "user@.service", "source": "systemd", "state": "unknown", "status": "static" }, "user@0.service": { "name": "user@0.service", "source": "systemd", "state": "running", "status": "active" } } }, "changed": false } TASK [fedora.linux_system_roles.vpn : Get the ipsec tcp service ports] ********* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:7 Monday 21 November 2022 20:21:06 +0000 (0:00:02.419) 0:00:22.270 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Initialize _vpn_selinux] ***************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:15 Monday 21 November 2022 20:21:06 +0000 (0:00:00.057) 0:00:22.327 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Add the ipsec service ports to _vpn_selinux] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:19 Monday 21 November 2022 20:21:06 +0000 (0:00:00.057) 0:00:22.385 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [Ensure the service and the ports status with the selinux role] *********** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:26 Monday 21 November 2022 20:21:06 +0000 (0:00:00.083) 0:00:22.468 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Ensure OpenSSL is installed on the controller] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:23 Monday 21 November 2022 20:21:06 +0000 (0:00:00.057) 0:00:22.526 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Enforce default auth method as needed] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:31 Monday 21 November 2022 20:21:06 +0000 (0:00:00.056) 0:00:22.582 ******* ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "hosts": { "host01.local": "", "host02.local": "", "sut": "" }, "opportunistic": true, "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Make sure that the hosts list is not empty] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:41 Monday 21 November 2022 20:21:06 +0000 (0:00:00.058) 0:00:22.641 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Make sure there is at least one pair of hosts in each connection] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:55 Monday 21 November 2022 20:21:06 +0000 (0:00:00.054) 0:00:22.696 ******* ok: [sut -> localhost] => { "ansible_facts": { "vpn_connections": [ { "auth_method": "cert", "hosts": { "host01.local": "", "host02.local": "", "sut": "" }, "opportunistic": true, "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Ensure cert_names are populated when auth_method is cert] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:69 Monday 21 November 2022 20:21:06 +0000 (0:00:00.066) 0:00:22.762 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [fedora.linux_system_roles.vpn : Generate PSKs or use provided shared_key_content] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:95 Monday 21 November 2022 20:21:06 +0000 (0:00:00.110) 0:00:22.873 ******* ok: [sut -> localhost] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : set psks for hosts] ********************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:134 Monday 21 November 2022 20:21:06 +0000 (0:00:00.064) 0:00:22.937 ******* ok: [sut] => { "censored": "the output has been hidden due to the fact that 'no_log: true' was specified for this result", "changed": false } TASK [fedora.linux_system_roles.vpn : create ipsec.conf files] ***************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:158 Monday 21 November 2022 20:21:06 +0000 (0:00:00.141) 0:00:23.078 ******* TASK [fedora.linux_system_roles.vpn : check if secrets file already exists] **** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:166 Monday 21 November 2022 20:21:07 +0000 (0:00:00.053) 0:00:23.132 ******* TASK [fedora.linux_system_roles.vpn : create ipsec.secrets files] ************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:172 Monday 21 November 2022 20:21:07 +0000 (0:00:00.056) 0:00:23.189 ******* TASK [fedora.linux_system_roles.vpn : build opportunistic configuration] ******* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:182 Monday 21 November 2022 20:21:07 +0000 (0:00:00.027) 0:00:23.216 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml for sut => (item=(censored due to no_log)) TASK [fedora.linux_system_roles.vpn : Set current IP fact for each host] ******* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:3 Monday 21 November 2022 20:21:07 +0000 (0:00:00.074) 0:00:23.291 ******* ok: [sut] => { "ansible_facts": { "current_ip": "10.31.13.69" }, "changed": false } TASK [fedora.linux_system_roles.vpn : Set IP with prefix register] ************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:7 Monday 21 November 2022 20:21:07 +0000 (0:00:00.055) 0:00:23.347 ******* ok: [sut] => { "changed": false, "cmd": "set -euo pipefail\nip addr show | grep 10.31.13.69 | awk '{print $2}'", "delta": "0:00:00.008412", "end": "2022-11-21 20:21:07.570639", "rc": 0, "start": "2022-11-21 20:21:07.562227" } STDOUT: 10.31.13.69/22 TASK [fedora.linux_system_roles.vpn : Set net CIDR fact] *********************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:14 Monday 21 November 2022 20:21:07 +0000 (0:00:00.384) 0:00:23.731 ******* ok: [sut] => { "ansible_facts": { "current_subnet": "10.31.12.0/22" }, "changed": false } TASK [fedora.linux_system_roles.vpn : Set policies fact] *********************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:18 Monday 21 November 2022 20:21:07 +0000 (0:00:00.054) 0:00:23.786 ******* ok: [sut] => { "ansible_facts": { "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Apply the default policy as needed] ****** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:22 Monday 21 November 2022 20:21:07 +0000 (0:00:00.060) 0:00:23.847 ******* ok: [sut -> localhost] => { "ansible_facts": { "policies": [ { "cidr": "203.0.113.0/24", "policy": "private" }, { "cidr": "198.51.100.0/24", "policy": "clear" }, { "cidr": "10.31.12.0/22", "policy": "private-or-clear" }, { "cidr": "169.254.0.0/16", "policy": "private-or-clear" } ] }, "changed": false } TASK [fedora.linux_system_roles.vpn : Write tunnel policies for each network] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:47 Monday 21 November 2022 20:21:07 +0000 (0:00:00.126) 0:00:23.973 ******* changed: [sut] => (item=private) => { "ansible_loop_var": "item", "changed": true, "checksum": "e155591e8b0f944858c8355cda5541540570cf3a", "dest": "/etc/ipsec.d/policies/private", "gid": 0, "group": "root", "item": "private", "md5sum": "cb03dec92873dd34e00074455c37d368", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 37, "src": "/root/.ansible/tmp/ansible-tmp-1669062067.9224277-7549-3870859501894/source", "state": "file", "uid": 0 } changed: [sut] => (item=clear) => { "ansible_loop_var": "item", "changed": true, "checksum": "59ed83096bd9697b6de3e8945e42fbecbdd91f51", "dest": "/etc/ipsec.d/policies/clear", "gid": 0, "group": "root", "item": "clear", "md5sum": "67fdf1cd19de70e05ec51ccffe0b3b37", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 38, "src": "/root/.ansible/tmp/ansible-tmp-1669062068.8595657-7549-85999259071515/source", "state": "file", "uid": 0 } changed: [sut] => (item=private-or-clear) => { "ansible_loop_var": "item", "changed": true, "checksum": "54ea172ef61dd2c4a217bd555b310cd605166333", "dest": "/etc/ipsec.d/policies/private-or-clear", "gid": 0, "group": "root", "item": "private-or-clear", "md5sum": "42d8ec8176e784962e643caaf18d29eb", "mode": "0644", "owner": "root", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 51, "src": "/root/.ansible/tmp/ansible-tmp-1669062069.5186782-7549-99771327214994/source", "state": "file", "uid": 0 } NOTIFIED HANDLER fedora.linux_system_roles.vpn : restart vpn service and wait for ssh conn to return for sut NOTIFIED HANDLER fedora.linux_system_roles.vpn : restart vpn service and wait for ssh conn to return for sut NOTIFIED HANDLER fedora.linux_system_roles.vpn : send pings to initialize mesh connections for sut NOTIFIED HANDLER fedora.linux_system_roles.vpn : send pings to initialize mesh connections for sut TASK [fedora.linux_system_roles.vpn : Deploy opportunistic configuration to each node] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:57 Monday 21 November 2022 20:21:10 +0000 (0:00:02.307) 0:00:26.280 ******* changed: [sut] => { "changed": true, "checksum": "294f1163b17b2f6859ad85506eaa34bf832dea8d", "dest": "/etc/ipsec.d/mesh.conf", "gid": 0, "group": "root", "md5sum": "28232364328e52dccdbbc71906fc4404", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:ipsec_key_file_t:s0", "size": 840, "src": "/root/.ansible/tmp/ansible-tmp-1669062070.2109013-7578-138742297644151/source", "state": "file", "uid": 0 } META: role_complete for sut TASK [meta] ******************************************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:52 Monday 21 November 2022 20:21:10 +0000 (0:00:00.727) 0:00:27.008 ******* RUNNING HANDLER [fedora.linux_system_roles.vpn : restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:2 Monday 21 November 2022 20:21:10 +0000 (0:00:00.000) 0:00:27.008 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : enable and restart vpn services] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Monday 21 November 2022 20:21:10 +0000 (0:00:00.037) 0:00:27.046 ******* changed: [sut] => (item=ipsec) => { "ansible_job_id": "668870387637.6026", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/668870387637.6026", "started": 1 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Monday 21 November 2022 20:21:11 +0000 (0:00:00.719) 0:00:27.765 ******* ok: [sut] => { "changed": false, "elapsed": 3 } RUNNING HANDLER [fedora.linux_system_roles.vpn : send pings to initialize mesh connections] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:6 Monday 21 November 2022 20:21:15 +0000 (0:00:03.725) 0:00:31.491 ******* skipping: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "skip_reason": "Conditional result was False" } RUNNING HANDLER [fedora.linux_system_roles.vpn : restart vpn service and wait for ssh conn to return] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:2 Monday 21 November 2022 20:21:15 +0000 (0:00:00.035) 0:00:31.527 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml for sut RUNNING HANDLER [fedora.linux_system_roles.vpn : enable and restart vpn services] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Monday 21 November 2022 20:21:15 +0000 (0:00:00.037) 0:00:31.564 ******* changed: [sut] => (item=ipsec) => { "ansible_job_id": "141816402867.6477", "ansible_loop_var": "item", "changed": true, "finished": 0, "item": "ipsec", "results_file": "/root/.ansible_async/141816402867.6477", "started": 1 } RUNNING HANDLER [fedora.linux_system_roles.vpn : Wait for ssh connection to return] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 Monday 21 November 2022 20:21:15 +0000 (0:00:00.558) 0:00:32.122 ******* ok: [sut] => { "changed": false, "elapsed": 3 } RUNNING HANDLER [fedora.linux_system_roles.vpn : send pings to initialize mesh connections] *** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/handlers/main.yml:6 Monday 21 November 2022 20:21:19 +0000 (0:00:03.556) 0:00:35.679 ******* skipping: [sut] => (item=sut) => { "ansible_loop_var": "item", "changed": false, "item": "sut", "skip_reason": "Conditional result was False" } META: ran handlers TASK [Assert file existence] *************************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:54 Monday 21 November 2022 20:21:19 +0000 (0:00:00.044) 0:00:35.724 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/assert_mesh_conf_exists.yml for sut TASK [stat mesh.conf file path] ************************************************ task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/assert_mesh_conf_exists.yml:2 Monday 21 November 2022 20:21:19 +0000 (0:00:00.068) 0:00:35.792 ******* ok: [sut] => { "changed": false, "stat": { "atime": 1669062072.2490315, "attr_flags": "e", "attributes": [ "extents" ], "block_size": 4096, "blocks": 8, "charset": "us-ascii", "checksum": "294f1163b17b2f6859ad85506eaa34bf832dea8d", "ctime": 1669062070.8010077, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 262341, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1669062070.5560038, "nlink": 1, "path": "/etc/ipsec.d/mesh.conf", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 840, "uid": 0, "version": "683092225", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false } } TASK [Assert that mesh.conf exists] ******************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/assert_mesh_conf_exists.yml:7 Monday 21 November 2022 20:21:19 +0000 (0:00:00.253) 0:00:36.046 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [reset success flag] ****************************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:57 Monday 21 November 2022 20:21:19 +0000 (0:00:00.036) 0:00:36.082 ******* ok: [sut] => { "ansible_facts": { "__vpn_success": true }, "changed": false } TASK [get and store mesh.conf file] ******************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:61 Monday 21 November 2022 20:21:19 +0000 (0:00:00.028) 0:00:36.110 ******* ok: [sut] => { "changed": false, "content": "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", "encoding": "base64", "source": "/etc/ipsec.d/mesh.conf" } TASK [extract content for conn private] **************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:66 Monday 21 November 2022 20:21:20 +0000 (0:00:00.363) 0:00:36.474 ******* ok: [sut] => { "ansible_facts": { "conn_private": "conn private\n type=tunnel\n left=%defaultroute\n leftid=%fromcert\n rightid=%fromcert\n rightrsasigkey=%cert\n rightca=%same\n leftcert=main_cert\n auto=route\n right=%opportunisticgroup\n negotiationshunt=hold\n failureshunt=drop\n ikev2=insist\n keyingtries=1\n retransmit-timeout=2s" }, "changed": false } TASK [extract content for conn private-or-clear] ******************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:70 Monday 21 November 2022 20:21:20 +0000 (0:00:00.055) 0:00:36.529 ******* ok: [sut] => { "ansible_facts": { "conn_private_or_clear": "conn private-or-clear\n type=tunnel\n left=%defaultroute\n leftid=%fromcert\n rightid=%fromcert\n rightrsasigkey=%cert\n rightca=%same\n leftcert=main_cert\n auto=route\n right=%opportunisticgroup\n negotiationshunt=hold\n failureshunt=passthrough\n ikev2=insist\n keyingtries=1\n retransmit-timeout=2s" }, "changed": false } TASK [extract content for conn clear] ****************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:74 Monday 21 November 2022 20:21:20 +0000 (0:00:00.051) 0:00:36.581 ******* ok: [sut] => { "ansible_facts": { "conn_clear": "conn clear\n type=passthrough\n left=%defaultroute\n right=%group\n auto=route\n authby=never\n" }, "changed": false } TASK [check that private section contains correct information] ***************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:78 Monday 21 November 2022 20:21:20 +0000 (0:00:00.050) 0:00:36.631 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [assert success for private part of conf file] **************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:97 Monday 21 November 2022 20:21:20 +0000 (0:00:00.045) 0:00:36.677 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [check that private-or-clear section contains correct information] ******** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:102 Monday 21 November 2022 20:21:20 +0000 (0:00:00.050) 0:00:36.727 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [assert success for private or clear part of conf file] ******************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:121 Monday 21 November 2022 20:21:20 +0000 (0:00:00.046) 0:00:36.774 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [check that clear section contains correct information] ******************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:126 Monday 21 November 2022 20:21:20 +0000 (0:00:00.057) 0:00:36.831 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [assert success for clear part of conf file] ****************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:136 Monday 21 November 2022 20:21:20 +0000 (0:00:00.038) 0:00:36.870 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [get and store policies private file] ************************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:141 Monday 21 November 2022 20:21:20 +0000 (0:00:00.050) 0:00:36.920 ******* ok: [sut] => { "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCjIwMy4wLjExMy4wLzI0Cg==", "encoding": "base64", "source": "/etc/ipsec.d/policies/private" } TASK [get and store policies private or clear file] **************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:146 Monday 21 November 2022 20:21:21 +0000 (0:00:00.248) 0:00:37.169 ******* ok: [sut] => { "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCjEwLjMxLjEyLjAvMjIKMTY5LjI1NC4wLjAvMTYK", "encoding": "base64", "source": "/etc/ipsec.d/policies/private-or-clear" } TASK [get and store policies clear file] *************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:151 Monday 21 November 2022 20:21:21 +0000 (0:00:00.233) 0:00:37.403 ******* ok: [sut] => { "changed": false, "content": "IwojIEFuc2libGUgbWFuYWdlZAojCjE5OC41MS4xMDAuMC8yNAo=", "encoding": "base64", "source": "/etc/ipsec.d/policies/clear" } TASK [check contents of policy private file] *********************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:156 Monday 21 November 2022 20:21:21 +0000 (0:00:00.233) 0:00:37.637 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [assert success for policy private file] ********************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:163 Monday 21 November 2022 20:21:21 +0000 (0:00:00.052) 0:00:37.689 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [check contents of policy private or clear file] ************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:168 Monday 21 November 2022 20:21:21 +0000 (0:00:00.052) 0:00:37.742 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [assert success for policy private or clear file] ************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:177 Monday 21 November 2022 20:21:21 +0000 (0:00:00.052) 0:00:37.795 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [check contents of policy clear file] ************************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:182 Monday 21 November 2022 20:21:21 +0000 (0:00:00.051) 0:00:37.846 ******* skipping: [sut] => { "changed": false, "skip_reason": "Conditional result was False" } TASK [assert success for policy clear file] ************************************ task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:189 Monday 21 November 2022 20:21:21 +0000 (0:00:00.050) 0:00:37.896 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [check the firewall and the selinux port status] ************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:194 Monday 21 November 2022 20:21:21 +0000 (0:00:00.054) 0:00:37.951 ******* included: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/check_firewall_selinux.yml for sut TASK [Get firewall service] **************************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/check_firewall_selinux.yml:4 Monday 21 November 2022 20:21:21 +0000 (0:00:00.044) 0:00:37.996 ******* ok: [sut] => { "changed": false, "cmd": [ "firewall-cmd", "--list-services" ], "delta": "0:00:00.291663", "end": "2022-11-21 20:21:22.381393", "rc": 0, "start": "2022-11-21 20:21:22.089730" } STDOUT: dhcpv6-client ipsec mdns ssh TASK [Ensure 'ipsec' is in the firewalld service list] ************************* task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/check_firewall_selinux.yml:9 Monday 21 November 2022 20:21:22 +0000 (0:00:00.545) 0:00:38.541 ******* ok: [sut] => { "changed": false } MSG: All assertions passed TASK [Get associated selinux ports] ******************************************** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/check_firewall_selinux.yml:14 Monday 21 November 2022 20:21:22 +0000 (0:00:00.043) 0:00:38.584 ******* ok: [sut] => { "changed": false, "cmd": "set -euo pipefail\nfirewall-cmd --info-service=ipsec | egrep \"^ +ports: +\" | sed -e \"s/ *ports: //\"", "delta": "0:00:00.288590", "end": "2022-11-21 20:21:22.966307", "rc": 0, "start": "2022-11-21 20:21:22.677717" } STDOUT: 500/udp 4500/udp 4500/tcp TASK [Check associated selinux ports when vpn_manage_selinux is true] ********** task path: /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/check_firewall_selinux.yml:22 Monday 21 November 2022 20:21:22 +0000 (0:00:00.542) 0:00:39.126 ******* skipping: [sut] => (item=500/udp) => { "ansible_loop_var": "item", "changed": false, "item": "500/udp", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=4500/udp) => { "ansible_loop_var": "item", "changed": false, "item": "4500/udp", "skip_reason": "Conditional result was False" } skipping: [sut] => (item=4500/tcp) => { "ansible_loop_var": "item", "changed": false, "item": "4500/tcp", "skip_reason": "Conditional result was False" } META: ran handlers META: ran handlers PLAY RECAP ********************************************************************* sut : ok=68 changed=14 unreachable=0 failed=0 skipped=30 rescued=0 ignored=0 Monday 21 November 2022 20:21:23 +0000 (0:00:00.120) 0:00:39.247 ******* =============================================================================== fedora.linux_system_roles.vpn : Ensure required packages are installed --- 5.13s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/main.yml:6 fedora.linux_system_roles.vpn : Wait for ssh connection to return ------- 3.73s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 fedora.linux_system_roles.vpn : Wait for ssh connection to return ------- 3.56s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:11 fedora.linux_system_roles.firewall : Install python3-firewall ----------- 2.74s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:18 fedora.linux_system_roles.firewall : Install firewalld ------------------ 2.68s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:7 fedora.linux_system_roles.vpn : Populate service facts ------------------ 2.42s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/selinux.yml:3 fedora.linux_system_roles.firewall : Configure firewall ----------------- 2.36s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:36 fedora.linux_system_roles.vpn : Write tunnel policies for each network --- 2.31s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:47 fedora.linux_system_roles.firewall : Enable and start firewalld service --- 1.58s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/main.yml:3 Gathering Facts --------------------------------------------------------- 0.99s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tests_mesh_cert.yml:3 fedora.linux_system_roles.vpn : Deploy opportunistic configuration to each node --- 0.73s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:57 fedora.linux_system_roles.vpn : enable and restart vpn services --------- 0.72s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 fedora.linux_system_roles.vpn : enable and restart vpn services --------- 0.56s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/enable_restart_vpn.yml:2 Get firewall service ---------------------------------------------------- 0.55s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/check_firewall_selinux.yml:4 Get associated selinux ports -------------------------------------------- 0.54s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/check_firewall_selinux.yml:14 fedora.linux_system_roles.vpn : Ensure ansible_facts used by role ------- 0.46s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 fedora.linux_system_roles.vpn : Ensure ansible_facts used by role ------- 0.46s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/set_vars.yml:2 fedora.linux_system_roles.firewall : Ensure ansible_facts used by role --- 0.44s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/firewall/tasks/firewalld.yml:2 Create nss directory for testing ---------------------------------------- 0.41s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/tests/tasks/setup_test.yml:22 fedora.linux_system_roles.vpn : Set IP with prefix register ------------- 0.38s /WORKDIR/dist-git-vpn-tests-check-firewall-only-if-managed-i5xyzvdj/.collection/ansible_collections/fedora/linux_system_roles/roles/vpn/tasks/mesh_conf.yml:7 ---^---^---^---^---^--- # STDERR: ---v---v---v---v---v--- [DEPRECATION WARNING]: [defaults]callback_whitelist option, normalizing names to new standard, use callbacks_enabled instead. This feature will be removed from ansible-core in version 2.15. Deprecation warnings can be disabled by setting deprecation_warnings=False in ansible.cfg. [WARNING]: The value 'False' is not a valid IP address or network, passing this value to ipaddr filter might result in breaking change in future. ---^---^---^---^---^---